Fog Computing: A Comprehensive Review of Architectures, Applications, and Security Challenges

Authors

  • Shatha A. Baker Northern Technical University
  • Salar Jamal Rashid Northern Technical University
  • Omar I. alsaif Northern Technical University

DOI:

https://doi.org/10.56286/ntujet.v2i2.614

Keywords:

Fog Computing, Edge Computing, Cloud Computing, Security

Abstract

Fog computing has emerged as a promising paradigm for bringing capabilities of cloud computing closer to the edge computing. It tries to overcome the limits of traditional cloud designs by putting storage, computing, and resources of networking closer to the data source. This results in accelerated processing, decreased latency, and enhanced system performance. Fog computing designs use a hierarchical approach, where the fog nodes act as an intermediary layer for local data processing and the cloud infrastructure acts as the top layer to support the fog nodes while the devices and sensors generate the data at the bottom layer. The paper discusses the uses of fog computing, and security issues,and suggests countermeasures including encryption, intrusion detection, and access control to reduce risks. It is anticipated that as fog computing develops further, it will spur creativity and efficiency in the linked world because to its adaptability and versatility. In order to properly utilize the promise of fog computing and handle security concerns, the paper underlines the significance of ongoing research and development.

Author Biography

  • Salar Jamal Rashid, Northern Technical University

    Received the B.Sc. and  M.Sc. in Computer Engineering Technology from Northern Technical University, Iraq in 2011 and 2016 respectively and received the Ph.D degree in Computer Engineering from University of Mosul, Iraq in 2023. His current research interests include Internet of Things, Computer Networks, Artificial intelligence and Information and communication Technology. He published many papers in the aforementioned research interests. He reviewed more than 10 papers in different fields. His total citations and H-index reached up to 19 and 3 respectively

Additional Files

Published

2023-10-17

Issue

Section

Review

How to Cite

[1]
“Fog Computing: A Comprehensive Review of Architectures, Applications, and Security Challenges”, NTU-JET, vol. 2, no. 2, Oct. 2023, doi: 10.56286/ntujet.v2i2.614.